New Stories

From FRAUD CONTROL

Webinar: Wangiri Warriors: Solutions & Strategies for Fighting Call Back Fraud

interview with Arnd Baranowski & John Haraburda & Igor Skutsenya & Colin Yates

Webinar: Wangiri Warriors: Solutions & Strategies for Fighting Call Back Fraud

A virtual webinar where four telecom fraud control experts give their perspective on Wangiri, the callback fraud.  They discusses strategies and explain the solutions they offer to service providers.

From FRAUD CONTROL

Black Swan Guide: Lanck Telecom’s Voice FMS as an On-Demand Network Service

interview with Igor Skutsenya

A Guide to a new and unique on-demand network service enabling fraud-risky international voice traffic to be monitored (and either alerted or blocked) as that traffic is routed through a wholesaler on its way to its final destinations.

From SECURITY

A&B Handshake: A Simple Way to Control Voice Fraud via an Out-of-Band Connection between A & B Operators

interview with Sergey Okhrimenko

An A&B operator handshake provides a simple, low-cost way to deliver an out-of-band connection to identify fraudulent voice calls in real-time, better manage fraud disputes, and pave the way for greater law enforcement help.

More Stories

Black Swan Solution Guide: SHAKEN / STIR Calling Number Verification & Fraud Alerting From SECURITY

Black Swan Solution Guide: SHAKEN / STIR Calling Number Verification & Fraud Alerting

interview with Chris Drake & Gary Richenaker

SHAKEN/STIR is the telecom industry’s first step toward reviving trust in business telephony — and has recently launched in the U.S. market.  This Solution Guide features commentary from technology leaders at iconetiv, a firm heavily involved in the development of SHAKEN.

From SECURITY

NuData Analyzes Behaviors to Stop Automated Fraud Attacks & Identify Fake Customers Inside the Firewall

interview with Robert Capps

A cybercrime expert examines the role of behavioral analysis and explains why it’s critical even when the device identity is known.  He also explains how human-like automation is detected and why an analysis of browser level activity delivers an extra edge in identifying fraud attacks.

Positive’s Research Keeps Telecoms One Step Ahead of Signaling Hackers and Fraud Disasters From SECURITY

Positive’s Research Keeps Telecoms One Step Ahead of Signaling Hackers and Fraud Disasters

interview with Jimmy Jones

And joining us to discuss signaling threats and protection techniques is Jimmy Jones, Positive Technologies’ Telecom Business Development Lead. Jimmy does a great job of simplifying An expert on signaling security: walks through signaling threats; shows how hackers penetrate and capture IMSIs; analyzes the growing signaling bypass threat; and explains the strategies taken by security-savvy telecoms.

SAS Manages an Analytics Hub of Internal, 3rd Party, and AI Data for Telco-Specific, Holistic Fraud Solutions From FRAUD CONTROL

SAS Manages an Analytics Hub of Internal, 3rd Party, and AI Data for Telco-Specific, Holistic Fraud Solutions

interview with Sundeep Tengur

A leading cross-industry fraud analytics firm provides: a picture of telecom threats; perspective on subscription and onboarding fraud; parallels to fraud control in banking; and a rundown on its telco-specific approach to solving fraud problems in a holistic way.

Black Swan Solution Guide: Getting Porting History & Carrier Data to Verify Identity & Mitigate Account Takeovers From FRAUD CONTROL

Black Swan Solution Guide: Getting Porting History & Carrier Data to Verify Identity & Mitigate Account Takeovers

by Kathy Timko

Learn about a recently approved risk intelligence service to receive authoritative and real-time notices of numbers being ported and changes to the carrier-of-record for specific telephone numbers.

Senet’s Cloud & Shared Gateways Drive LoRaWAN IoT Adoption for Enterprise Businesses, Smart Cities & Telecoms From B/OSS

Senet’s Cloud & Shared Gateways Drive LoRaWAN IoT Adoption for Enterprise Businesses, Smart Cities & Telecoms

interview with Bruce Chatterley

An IoT netowork pioneer explains how LoRaWAN tech fits in the larger IoT ecosystem.  He gives use case examples, describes deployment restraints/costs, and shows how partnering, gateway sharing, and flexible deployment options are stimulating growth.

LexisNexis Takes Identity Risk from Physical/Biometric to Network-Behavior-Sharing with 7,000 Digital Businesses From FRAUD CONTROL

LexisNexis Takes Identity Risk from Physical/Biometric to Network-Behavior-Sharing with 7,000 Digital Businesses

interview with Jason Lane-Sellers

An partner-network enabled identity  verification system is used by some of the largest financial and e-commerce firms in the world.  Learn how this new paradigm may revolutionize current identity and fraud control operations.

Black Swan Solution Guides & Papers

Other Recent Stories